General

  • Target

    SecuriteInfo.com.Variant.Tedy.123517.9877.3264

  • Size

    1.8MB

  • Sample

    220702-s37elagafm

  • MD5

    212b1e774e310dbe4e92b01854f31d53

  • SHA1

    635349bf28642a2a4b32155fe2864f6dfd51a483

  • SHA256

    d22de2ac8939c185e56867b691702abd0304adf75c2b62dbff801228bdcf0dbe

  • SHA512

    3c7be7251079c9610ddd5923307d4887746d6f43c8dcf81d82e2696726000cf8912be1530f1a388cd4520289bf0722dc270defbe23a631771a83befc2d9f689e

Malware Config

Extracted

Family

warzonerat

C2

workstation2022.ddns.net:5254

Targets

    • Target

      SecuriteInfo.com.Variant.Tedy.123517.9877.3264

    • Size

      1.8MB

    • MD5

      212b1e774e310dbe4e92b01854f31d53

    • SHA1

      635349bf28642a2a4b32155fe2864f6dfd51a483

    • SHA256

      d22de2ac8939c185e56867b691702abd0304adf75c2b62dbff801228bdcf0dbe

    • SHA512

      3c7be7251079c9610ddd5923307d4887746d6f43c8dcf81d82e2696726000cf8912be1530f1a388cd4520289bf0722dc270defbe23a631771a83befc2d9f689e

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Windows security bypass

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Warzone RAT Payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Account Manipulation

1
T1098

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks